## Advances in cryptology--CRYPTO '91: proceedings, Volume 1991Crypto '91 was the eleventh in a series of workshops on cryptology sponsoredby the International Association for Cryptologic Research and was held in Santa Barbara, California, in August 1991. This volume contains a full paper or an extended abstract for each of the 39 talks presented at the workshop. All theoretical and practical aspects of cryptology are represented, including: protocol design and analysis, combinatorics and authentication, secret sharing and information theory, cryptanalysis, complexity theory, cryptographic schemas based on number theory, pseudorandomness, applications and implementations, viruses, public-key cryptosystems, and digital signatures. |

### What people are saying - Write a review

We haven't found any reviews in the usual places.

### Contents

A Calculus for Access Control in Distributed Systems invited | 1 |

Deriving the Complete Knowledge of Participants in Cryptographic Protocols | 24 |

Systematic Design of TwoParly Authentication Protocols | 44 |

Copyright | |

26 other sections not shown

### Other editions - View all

### Common terms and phrases

addition adversary algorithm Alice Alice and Bob assume assumption authentication codes binary bits boolean byte cheating choose chosen ciphertext attack circuit closure co-NP Computer Science construct Crypto cryptographic decryption defined definition delegation denote digital signature discrete logarithm distribution divisor efficient elements elliptic curves encoding rules encryption equation example exists given Goldwasser hash functions hyperelliptic hyperelliptic curve IEEE input integer interactive proof system jacobian knowledge Lemma Micali modulo multiplicative n-bit node non-interactive oblivious transfer obtain one-way functions operations oracle output permutation plaintext attack polynomial possible prime probability problem Proc Proceedings processors prove public cryptosystems public key random result rounds satisfies secret key exchange secret sharing scheme Section secure protocol sends Shamir signature scheme Step string Theorem trapdoor functions untraceable variables vector verifiable secret sharing zero zero-knowledge proof